FINALTERM
EXAMINATION
Spring 2010
CS507- Information Systems
Time: 90 min
Marks: 60
Question No: 1 ( Marks: 1 ) - Please choose one
The organizational structures are formulated in order to efficiently
manage which of the following:
► Business Cost
► Business Operations
► Business Size
Ref: As the volume of business expands, the need for disciplined approach to
managing operations is required. This results in formulation of organizational
structures. The organizational structures are formulated in order to efficiently
manage the business operations.
Question No: 2 ( Marks: 1 ) - Please choose one
Leading ERP software vendors include SAP (SAP R/3), Oracle and
PeopleSoft.
► True
► False
Reference: http://books.google.com.pk/books?
id=sjY3IZ9Unv0C&pg=PA87&lpg=PA87&dq=Leading+ERP+software+vend
ors+include+SAP+(SAP+R/3),
+Oracle+and+PeopleSoft&source=bl&ots=HVnWCQHWCp&sig=161Hzqiuq0
vVKxOYIHRWhBkUOc4&hl=en&ei=y-
w2TI6aN42ksQPdkPyoBQ&sa=X&oi=book_result&ct=result&resnum=6&ved
=0CCcQ6AEwBQ#v=onepage&q=Leading%20ERP%20software%20vendors
%20include%20SAP%20(SAP%20R%2F3)%2C%20Oracle%20and
%20PeopleSoft&f=false
Question No: 3 ( Marks: 1 ) - Please choose one
Business-to-business EC (B2B) is one of the types of ECommerce.
► True
► False
Explanation: Business to Business (B2B) is a model to e-commerce where
businesses conduct commerce amongst themselves over the Internet/Intranet.
Question No: 4 ( Marks: 1 ) - Please choose one
---------- simply means a particular technique of directing one's attention
in learning, discovery or problem solving.
► Robustness
► Heuristic
► DSS
► EIS
Ref: Heuristic simply means a particular technique of directing one’s attention
in learning, discovery or problem solving. It assists in non-routine decision
making process due to powerful analytical abilities.
Question No: 5 ( Marks: 1 ) - Please choose one
Which of the following works in conjunction with routers and firewalls by
monitoring network usage anomalies to protect a company’s information
systems resources from external as well as internal misuse?
► Encryption
► Intrusion Detection Systems
► Firewall
► All of above
Page 168
Intrusion Detection Systems (IDS)
Another element to securing networks is an intrusion detection system (IDS).
IDS is used in
complement to firewalls. An IDS works in conjunction with routers and
firewalls by monitoring
network usage anomalies. It protects a company’s information systems
resources from external as
well as internal misuse.
Question No: 6 ( Marks: 1 ) - Please choose one
A risk is the possibility of a problem, whereas a problem is a risk that has
already occurred.
► True
► False
Question No: 7 ( Marks: 1 ) - Please choose one
Which of the following is a methodology used to create a plan for how an
organization will resume partially or completely interrupted critical functions
within a predetermined time after a disaster or disruption?
► Audit Logs
► Disaster Plan
► Audit Trials
► Business continuity Plan
BCP is the process where by the institutions ensure the maintenance and
recovery of operations including services to customers when confronted with
adverse events such as natural disasters, technology failure, human error and
terrorism.”
Question No: 8 ( Marks: 1 ) - Please choose one
Documentation may include program code of application soft wares, technical
manuals, user manuals etc.
► True
► False
Documentation may include program code of
application softwares, technical manuals, user manuals and any other system-
related
documentation. This would help to see that data is not modified on the
instructions of the users.
Question No: 9 ( Marks: 1 ) - Please choose one
Input controls monitor the initial handshaking procedure of the user with
the operating system.
► True
► False
Ref: Access controls monitor the initial handshaking procedure of the user with
the operating system.
Question No: 10 ( Marks: 1 ) - Please choose one
Processing instructions carried out by the operating system and
application software should be monitored by implementation of controls.
► True
► False
Processing instructions carried out by the operating system and application
software should be
monitored by implementation of controls. If the processing controls are not
effectively
implemented, we could have undesirable situations arising.
Page 148
Question No: 11 ( Marks: 1 ) - Please choose one
Firewall is the primary method for keeping a computer secure from
intruders.
► True
► False
Firewall
Firewall is the primary method for keeping a computer secure from intruders. A
firewall allows or blocks traffic into and out of a private network or the user's
computer.
Question No: 12 ( Marks: 1 ) - Please choose one
Which of the following is a data model or diagram for high-level
descriptions of conceptual data model.
► ERD
► Flow Chart
► Algorithm
► DFD
PAGE 120
Entity Relationship Diagram
"The entity-relationship diagram (ERD) is a data model or diagram for high-
level descriptions of
conceptual data model, and it provides a graphical notation for representing
such data models in the
form of entity-relationship diagrams."
Question No: 13 ( Marks: 1 ) - Please choose one
Which of the following is a project management technique that divides
complex projects into smaller, more easily managed segments or phases?
► SDLC
► System Design
► System Analysis
► Audit Trials
Ref:
Pg#68
Project lifecycle vs. SDLC
The systems development life cycle is a project management technique that
divides complex projects into smaller, more easily managed segments or
phases.
Question No: 14 ( Marks: 1 ) - Please choose one
Which of the following has collection of predefined procedures related to each
other?
► Organization
► System
► Firm
Systems have collection of predefined procedures related to each other in a
sequenced logical manner in order to collectively achieve the desired results.
The system & procedures in all kinds of environment are subject to internal
controls and checks that are necessary to ensure the effectiveness of the same
PAge 18.
Question No: 15 ( Marks: 1 ) - Please choose one
Which of the following increment in incremental model is usually the core
product which addresses the basic requirements of the system?
► First
► Second
► Third
Ref: The first increment is usually the core product which addresses the basic
requirements of the system. This maybe either be used by the client or
subjected to detailed review to develop a plan for the next increment.
Question No: 16 ( Marks: 1 ) - Please choose one
__________ overwrites every program/software/file it infects with itself. Hence
the infected file no longer functions.
► Dropper
► Overwriting Viruses
► Boot sector Virus
page 140
Overwriting Viruses
As the name implies, it overwrites every program/software/file it infects with
itself. Hence the infected file no longer functions.
Question No: 17 ( Marks: 1 ) - Please choose one
__________ is a person who attempts to invade the privacy of the system.
► Hacktivsts
► Hackers
► Crackers
A hacker is a person who attempts to invade the privacy of the system. In fact
he attempts to gain un authorized entry to a computer system by circumventing
the system’s access controls. Hackers are normally skilled programmers, and
have been known to crack system passwords, with quite an ease.
Question No: 18 ( Marks: 1 ) - Please choose one
Individuals using their skills to forward a political agenda, possibly breaking
the law in the process, but justifying their actions for political reasons are called
________
► Hacktivsts
► Crackers
► Hackers
Hacktivsts
This refers to individuals using their skills to forward a political agenda,
possibly breaking the law in the process, but justifying their actions for political
reasons.
page 144
Question No: 19 ( Marks: 1 ) - Please choose one
Both software objects and real time objects have__________
► Identity and behavior
► Identity and state
► State and behavior
Ref: Software objects are modeled after real-world objects in that they too have
state and behavior.
Question No: 20 ( Marks: 1 ) - Please choose one
Characteristics of object are called ________
► Methods
► Attributes
► Status
Exlanation: Attributes are the characteristics of object / class and methods are
the operations related to the object / class.
Question No: 21 ( Marks: 1 ) - Please choose one
Which of the following carry characteristics of specialization?
► Sub classes
► Sub Interfaces
► Sub objects
Ref: Classification is hierarchical in nature, a vehicle may be classified as truck
or car, a car may further be Sub- classified as hatchback or sedan or sports or
SUV. Moving up the hierarchy is terms as generalization and down the
hierarchy is referred to as specialization.
Question No: 22 ( Marks: 1 ) - Please choose one
Audit Trial is a weakness that can be accidentally triggered or intentionally
exploited.
► True
► False
Ref: Vulnerability is a weakness that can be accidentally triggered or
intentionally exploited.
Question No: 23 ( Marks: 1 ) - Please choose one
M-Commerce (mobile commerce) refers to the conduct of e-commerce via
wireless devices.
► True
► False
Ref: Electronic commerce has gradually shifted to a modern form in the name
of Mobile commerce. M-Commerce (mobile commerce) refers to the conduct
of e-commerce via wireless devices. These devices can be connected to the
Internet, making it possible for users to conduct transactions from anywhere.
Question No: 24 ( Marks: 1 ) - Please choose one
Buying and selling of products, services and information via computer
networks, primarily through Internet is :
► E-Commerce
► E-Business
► Web Surfing
► BPR
page 172
E-Commerce
Electronic Commerce (e-commerce or EC) describes the buying, selling, and
exchanging of
products, services, and information via computer network, primarily the
internet. Some people
view the term commerce as describing transactions conducted between
business partners. Ebusiness
is a broad definition of EC, not just buying and selling, but also servicing
customers,
Question No: 25 ( Marks: 1 ) - Please choose one
Which of the following helps in getting the right material and physical
resources together at the right place and at the right time to meet the
customer’s requirements?
► BRP
► MRP
► CRP
Reference:
Page # 62, Lecture # 13
MRP helps in getting the right material and physical resources together at the
right place and at
the right time to meet the customer’s requirements.
Question No: 26 ( Marks: 1 ) - Please choose one
__________ is an association among entities. There has to be a relationship
between two entities
► Value Sets
► Cardinality
► Relationships
Page 124
Relationships
A relationship is an association among entities. There has to be a relationship
between two entities.
Question No: 27 ( Marks: 1 ) - Please choose one
One of the methods of integrating different business information systems is
Supply Chain management software.
► True
► False
Question No: 28 ( Marks: 1 ) - Please choose one
Which of the following carries connotations of the class to which the object
belonged?
► Class
► Instance
► Structure
► None of the above
Page 119+120
An object is an instance of some class. All objects are instances of some class.
Instance also carries
connotations of the class to which the object belongs.
Question No: 29 ( Marks: 1 ) - Please choose one
Object oriented analysis focuses on _________
► Modular approach
► Incremental approach
► Traditional approach
► Derived approach
Ref: object-oriented programming, a modular approach to computer
program (software) design. Each module, or object, combines data and
procedures (sequences of instructions) that act on the data; in traditional, or
procedural, programming the data are separated from the instructions.
Question No: 30 ( Marks: 1 ) - Please choose one
Evaluate recovery patterns, relevant costs involved is an example of monitoring
► TRUE
► FALSE
Ref: Monitoring helps in evaluating the quality of decisions that have been
made. This may include the following:
o Quantifying the speed in the process of recovery.
o Discount costs being born by the organization.
o Customer response in accepting the entire policy.
o Once again MIS will be used to record and report the results / effects of
the policy.
Question No: 31 ( Marks: 2 )
What are the information requirements of the service sector?
Answer:
Information requirements of Service Sector
• Quality of service provided.
• Mode of delivery
• Customer Satisfaction
• Time Scheduling
• Resource Management
Question No: 32 ( Marks: 2 )
Define Business Continuity Planning (BCP) ?
Answer: Business Continuity Planning (BCP) is a methodology used to create
a plan for how an organization will resume partially or completely interrupted
critical functions within a predetermined time after a disaster or disruption.”
Question No: 33 ( Marks: 2 )
Identify different types of Information assets ?
1- Security Policy
2- Security Program
Question No: 34 ( Marks: 2 )
Identify components of Intrusion detection system ?
Answer: Components of IDS
An IDS comprises on the following:
• Sensors that are responsible for collecting data. The data can be in the form of
network packets, log files, system call traces, etc.
• Analyzers that receive input from sensors and determines intrusive activity.
• An administration
Question No: 35 ( Marks: 3 )
What is the necessary information needed to begin impact analysis?
Answer: Before beginning the impact analysis, it is necessary to obtain the
following necessary information.
• System mission
• System and data criticality
• System and data sensitivity
Question No: 36 ( Marks: 3 )
Define Active attacks?
Answer: Active attacks may include obtaining unauthorized access to modify
data or programs, causing a denial of service, escalating privileges, accessing
other systems. They affect the integrity, availability and authentication
attributes of network security.
Question No: 37 ( Marks: 3 )
Why is it needed for Accounting information system (AIS) to be linked with
all other information systems in an organization?
Answer: Accounting information system (AIS) is linked to all the information
systems in an organization. This is important because the data required for
proper book keeping and generation of transactional reports is extracted from
all over the organization. For instance sales information can be sought only
from marketing information system and stock information is available in
manufacturing information system.
Question No: 38 ( Marks: 3 )
Identify any six factors that should be considered in order for change to be
successful?
Answer:
Following factors should be considered in order for change to be
successful:
• What are the implications and barriers to successful implementation?
• What processes will we need to change/introduce?
• Who will feel threatened by the change?
• How do we change people's behavior?
• How will success be measured and what value will success
Have for the business and individual?
•Is the proposed change aligned with the strategic plan?
Question No: 39 ( Marks: 5 )
What do you understand by Privacy? How can privacy be protected? List
threats to Privacy.
Answer:
Privacy means the quality or condition of being secluded from the presence or
view of others, the state of being free from unsanctioned intrusion: a person's
right to privacy, the state of being concealed; secrecy. Privacy is quite a
subjective/relative concept.
Protecting Privacy
The rights of privacy must be balanced against the needs of the society. Every
society has to decide somewhere on the gray area between hiding all and
knowing all extremes. Public’s rights to know is superior to the individual’s
rights of privacy. Usually public and individual’s rights stand in conflict with
each other. Since government agencies have their concerns in priority e.g.
criminal investigation, undesirable social activities. Various aspects can be seen
as a threat to privacy.
Threats to Privacy
• Electronic surveillance
• Data Profiling
• Online Privacy
• Workplace monitoring
• Location tracking
• Background checks
• Financial privacy
• Medical record and genetic profiling
• Digital right
• Intellectual property rights
• Taxation Issues
Question No: 40 ( Marks: 5 )
Give any two examples to prove that Audit trails help to provide variants from
normal behavior which may lead to unauthorized usage of resources.
Answer: Audit trails help to provide variants from normal behavior which may
lead to unauthorized usage of resources. For example
• Audit trails can be used together with access controls to identify and provide
information about users suspected of improper modification of data (e.g.,
introducing
errors into a database).
• An audit trail may record "before" and "after" images, also called snapshots of
records.